THEORY and PRACTICE

Tom Berson, Founder, Anagram Laboratories: From Arcana to Ubiquity: A brief historical review of cryptography and cryptology, summarizing how we got from arcane to ubiquitous.

John Gilmore, co-founder, Electronic Frontier Foundation, Cypherpunks mailing list, and Cygnus Solutions: Who’s Spying Now: How the work of Diffie and Hellman, and the publication of strong cryptographic primitives in the 1970s led in the 1990s to the hope that mass surveillance by governments could be defeated. . . and what happened next.

Open Discussion

POLICY AND LAW

Tom Berson, moderator

Jennifer Granick, Director of Civil Liberties at the Stanford Center for Internet and Society: Legal limits: The legal landscape surrounding encryption and security technology design, with a focus on (1) the scope of government ability to force companies to design surveillance-capable tools and networks and (2) government authority to defeat existing security measures (with or without provider technical assistance) in the name of greater surveillance.

Susan Landau, Professor of Cybersecurity Policy, Department of Social Science and Policy Studies at Worcester Polytechnic Institute: Truth and Consequences: The security risks that arise from providing government/law enforcement access to encrypted communications.

Herb Lin, Senior Research Scholar for cyber policy and security at the Center for International Security and Cooperation and Research Fellow at the Hoover: Question This!: Unquestioned assumptions that appear to drive the current encryption policy debate.